Abstract
This paper presents a proper solution for a medium enterprise or public institution that enables easier management of the digital documents library and eases the common document workflows. The main problem addressed by the proposed project is the complexity of document workflows in public administration. Documents that need to be filled out and signed are always around us and often can cause problems and delays when poorly managed. With its characteristics, our solution eliminates all the inconvenient of the document workflows helped by the document library and workflows, while keeping the security part, now represented by hand signatures with the implementation of the digital signatures. The main benefit it brings to the client is that it automates the signing and approval process to any kind of document it uses inside or outside the company. The signature system allows signing on multiple levels (counter-signatures) and multiple signatures per level (co-signatures) for perfectly mimicking a plain document.
An Erratum for this chapter can be found at http://dx.doi.org/10.1007/978-3-642-14799-9_37
Chapter PDF
Similar content being viewed by others
Keywords
References
Price, G.: Public Key Infrastructures: A research agenda. J. Comput. Secur. 14(5), 391–417 (2006)
Bou Diab, W., Tohme, S., Bassil, C.: Critical VPN security analysis and new approach for securing VOIP communications over VPN networks. In: Proceedings of the 3rd ACM Workshop on Wireless Multimedia Networking and Performance Modeling, WMuNeP ’07, Chania, Crete Island, Greece, October 22, pp. 92–96. ACM, New York (2007)
Staff 2009. E-Government Developments. IWAYS 32(3), 136–187 (2009)
Chou, C., Cheng, W.C., Golubchik, L.: Performance study of online batch-based digital signature schemes. J. Netw. Comput. Appl. 33(2), 98–114 (2010)
Zhao, C., Gao, F.: The business process model for IT service management. WTOS 7(12), 1494–1503 (2008)
Antonovich, M.: Office and SharePoint 2007, User’s Guide: Integrating SharePoint with Excel, Outlook, Access and Word (Pro). APress (2008)
Haron, G.R., Siong, N.K., Bee, T.F.: Translation of RFC 3820 to software codes using OpenSSL primitives. In: Sahni, S.K. (ed.) Proceedings of the Fourth IASTED international Conference on Advances in Computer Science and Technology, International Association Of Science And Technology For Development, Langkawi, Malaysia, April 02 - 04, pp. 109–114. ACTA Press, Anaheim (2008)
Nambiar, V.P., Khalil-Hani, M., Zabidi, M.M.: Accelerating the AES encryption function in OpenSSL for embedded systems. Int. J. Inf. Commun. Techol. 2(1/2), 83–93 (2009)
Sun, H., Ding, Y.: An Adaptable Method of E-Workflow Composition Based on Distributed Awareness. In: Ma, Y., Choi, D., Ata, S. (eds.) APNOMS 2008. LNCS, vol. 5297, pp. 503–506. Springer, Heidelberg (2008)
Pantaleev, A., Rountev, A.: Identifying Data Transfer Objects in EJB Applications. In: Proceedings of the 5th international Workshop on Dynamic Analysis, International Conference on Software Engineering, May 20 - 26, p. 5. IEEE Computer Society, Washington (2007)
Muñoz, J.L., Esparza, O., Forné, J., Pallares, E.: H-OCSP: A protocol to reduce the processing burden in online certificate status validation. Electronic Commerce Research 8(4), 255–273 (2008)
Policelli, J.: Active Directory Domain Services 2008, How-To. 1st. SAMS (2009)
de Souza, T.C., Martina, J.E., Custódio, R.F.: Audit and backup procedures for hardware security modules. In: Proceedings of the 7th Symposium on Identity and Trust on the internet, IDtrust ’08, Gaithersburg, Maryland, March 04 - 06, vol. 283, pp. 89–97. ACM, New York (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP International Federation for Information Processing
About this paper
Cite this paper
Pop, F., Dobre, C., Popescu, D., Ciobanu, V., Cristea, V. (2010). Digital Certificate Management for Document Workflows in E-Government Services. In: Wimmer, M.A., Chappelet, JL., Janssen, M., Scholl, H.J. (eds) Electronic Government. EGOV 2010. Lecture Notes in Computer Science, vol 6228. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14799-9_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-14799-9_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14798-2
Online ISBN: 978-3-642-14799-9
eBook Packages: Computer ScienceComputer Science (R0)